Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding

1 Answer

Answer :

(C) External level Datahiding

Related questions

Description : A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None

Last Answer : A) Conceptual

Description : The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical

Last Answer : A) Conceptual

Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above

Last Answer : C) Physical

Description : A …………. System is no more than idea A) Conceptual B) Logical C) Physical D) All of the above

Last Answer : A) Conceptual

Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.

Last Answer : (A) Conceptual view.

Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency

Last Answer : (C) Scripts 

Description : Which of the following is a legal expression in SQL? (A) SELECT NULL FROM EMPLOYEE; (B) SELECT NAME FROM EMPLOYEE; (C) SELECT NAME FROM EMPLOYEE WHERE SALARY = NULL; (D) None of the above

Last Answer : B) SELECT NAME FROM EMPLOYEE;

Description : The four levels of Cloud Federation include a) Conceptual level, Logical level, Operational level, Infrastructural level b) Conceptual level, Service level, Operational level, Infrastructural ... level, Infrastructural level d) Security level, Logical level, Operational level, Infrastructural leve

Last Answer : Conceptual level, Logical level, Operational level, Infrastructural level

Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level

Last Answer : Infrastructure Level

Description : According to Robert Katz, when managers have the mental ability to analyze and diagnose complex situations, they possess _____________ skills. (a) Technical ; (b) Leadership ; (c) Problem-solving ; (d) Conceptual

Last Answer : ; (d) Conceptual 

Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.

Last Answer : (D) independent of both hardware and software.

Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's

Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".

Description : In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD

Last Answer : (B) COBWEB

Description : The different types of tables maintained by the operating system are ............. A) memory, logical , I/O file B) memory, I/O, file, physical C) memory, I/O, file, process D) memory, logical, I/O, physical

Last Answer : C) memory, I/O, file, process

Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.

Last Answer : C) Manipulation & processing of database.

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32

Last Answer : (3) 15 and 14

Description : Ms. Shalini has just created a table named “Employee” containing columns Ename, Department, Salary. -Technology

Last Answer : SQL command to add a primary key column:Alter table employee add empid int primary key;Importance of Primary key in a table:Primary key column is used to uniquely identify each record of the table. A column defined as primary key cannot have a duplicate entry and can't be left blank.

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : In comparing management fraud with employee fraud, the auditor's risk of failing to discover the fraud is a. Greater for employee fraud because of the larger number of employees in ... existing internal controls. d. Greater for management fraud because managers are inherently smarter than employees.

Last Answer : Greater for management fraud because of management's ability to override existing internal controls

Description : In comparing management fraud with employee fraud, the auditor's risk of failing to discover the fraud is a. Greater for employee fraud because of the larger number of employees in the ... blue collar workers. d. Greater for management fraud because managers are inherently smarter than employees

Last Answer : Greater for management fraud because of management's ability to override existing internal controls

Description : Which of the following is/are the sources for project requests? A) Request from Department managers B) Request from senior executives C) Request from system Analyst D) All of the above

Last Answer : D) All of the above

Description : …………… is a way to bind the data and its associated functions together which allows the data and functions to be hidden. A) Structure B) Class C) Enum D) Both A and B

Last Answer : B) Class

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : What error will be generated if a space is given between the logical AND operator (&&)? Will it be a compile-time or a run-time error?

Last Answer : Example: if(5>2 & & 6

Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : A) i-true, ii-true, iii-false, iv-true

Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory

Last Answer : C) Virtual memory

Description : Which of the following is not a logical database structure? A) Chain B) Network C) Tree D) Relational

Last Answer : A) Chain

Description : A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above

Last Answer : B) is a standard way of organizing information into accessible parts.

Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B

Last Answer : C) Star

Description : Which of the following statements is true? (1) The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is satisfiable. (2) The sentence S is a logical consequence of ... S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn˄S is inconsistent.

Last Answer : The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is valid.

Description : Payment made by an employer to employee monthly, other than salary is called …………. A) Bonus B) Allowances C) Benefits D) None of these

Last Answer : B) Allowances

Description : Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ................... (A) 25 (B) 27 (C) 53 (D) 72

Last Answer : Answer: A  Explanation: Each router needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster, and 7 entries for distant clusters, for a total of 25 entries.

Description : If you are a salary employee, after working 67 hours in one week should you not be paid overtime?

Last Answer : property taxes are fully deductible from your income so you should be able to look on your pay stub. But the address was not a valid address so there was no way to look it up but a website you could use to look up your property taxes is http://www.city-data.com/city/Brooklyn-New-York.html

Description : In a system designed to work out the tax to be paid:An employee has £4000 of salary tax free. The next £1500 is taxed at 10% the next £28000 is taxed at 22%. Any further amount is taxed at 40% ... ) £4800; £14000; £28000 b) £5200; £5500; £28000 c) £28001; £32000; £35000 d) £5800; £28000; £32000

Last Answer : d) £5800; £28000; £32000

Description : In a system designed to work out the tax to be paid: An employee has £4000 of salary tax free. The next £1500 is taxed at 10%. The next £28000 after that is taxed at 22%. Any further amount is taxed ... of these is a valid Boundary Value Analysis test case? A. £28000. B. £33501. C. £32001. D. £1500

Last Answer : B. £33501.

Description : Write a program to input name and salary of employee and throw user defined exception if entered salary is negative. 

Last Answer : import java.io.*; class NegativeSalaryException extends Exception { public NegativeSalaryException (String str) { super(str); } } public class S1 { public static void main(String[] args) ...  catch (NegativeSalaryException a) {  System.out.println(a);  } } }

Description : Write a program to implement the concept of virtual base class for following figure. Accept and display information of one employee with his name, code, basic pay, experience and gross salary with the object of employee class.

Last Answer : #include<iostream.h> #include<conio.h> class Master  {  char name[10],code[3];  public:  void acceptM() { cout<<"\nEnter name and code "; cin>>name>>code; ... .displayM(); e.displayA(); e.displayD(); e.displayE(); getch();  }

Description : A software project was estimated at 352 Function Points (FP). A four person team will be assigned to this project consisting of an architect, two programmers, and a tester. The salary of the architect is Rs.80,000 per month, the ... ) Rs.28,16,000 (2) Rs.20,90,000 (3) Rs.26,95,000 (4) Rs.27,50,000

Last Answer : (4) Rs.27,50,000 

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : D) Internet Control Message Protocol (ICMP)

Description : Which conflict resolution technique do project managers use most often?  A. Smoothing B. Norming C. Confronting D. Forcing

Last Answer : C. Confronting

Description : What network model enables engineer managers to schedule, monitor and control large and complex projects by employing three time estimates per activity a. Forecasting b. Program evaluation review technique c. Critical path method d. simulation

Last Answer : b. Program evaluation review technique

Description : What network model enables engineer managers to schedule, monitor and control large and complex projects by using only one time factor per activity a. Forecasting b. Program evaluation review technique c. Critical path method d. simulation

Last Answer : b. Program evaluation review technique